Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2017 How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention David Philip Johnson Walden University Follow this and additional works at:https://scholarworks.waldenu.edu/dissertations Part of theDatabases and Information Systems Commons, and theEducation Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please [email protected]. Walden University College of Management and Technology This is to certify that the doctoral study by David Johnson has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Timothy Perez, Committee Chairperson, Information Technology Faculty Dr. Gail Miles, Committee Member, Information Technology Faculty Dr. Steven Case, University Reviewer, Information Technology Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2017 Abstract How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention by David P. Johnson MS, Western Governors University, 2013 BS, Western Governors University, 2012 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Information Technology Walden University December 2017 Abstract The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and perceived behavioral control (PBC) affected the intention of computer end users in a K-12 environment to follow InfoSec policy. Data collection was from 165 K-12 school administrators in Northeast Georgia using an online survey instrument. Data analysis occurred applying multiple linear regression and logistic regression. The TPB model accounted for 30.8% of the variance in intention to comply with InfoSec policies. SN was a significant predictor of intention in the model. ATT and PBC did not show to be significant. These findings suggest improvement to K-12 SETA programs can occur by addressing normative beliefs of the individual. The application of improved SETA programs by IT security program managers that incorporate the findings and recommendations of this study may lead to greater information security in K-12 school systems. More secure school systems can contribute to social change through improved information protection as well as increased freedoms and privacy for employees, students, the organization, and the community. How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention by David P. Johnson MS, Western Governors University, 2013 BS, Western Governors University, 2012 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Information Technology Walden University December 2017 Dedication I am dedicating this study to my wife, Cindy, and son, Ian. Without their unwavering encouragement, love, patience, understanding, and support this accomplishment would not be possible. The drive, commitment, strength, and tenacity they exhibit every day in meeting their own challenges provides me with the strength and motivation to meet my own. Cindy, your grace and strength is amazing and I stand in awe of you every day. You inspire me. Ian, your heart, mind, and will are all remarkably strong. The joy and success they will bring you is only matched by how tremendously proud I am of you. I am forever humbled and grateful for all you both do. It is my sincere hope that I can return the same love and support to empower you both so you too may accomplish all of your life’s dreams. It is my desire to enable you to explore and learn until your head, heart, and soul are rich and full. Most of all, I wish for you the same life of happiness, love, and joy that you have given me. Acknowledgments I would like to acknowledge and thank Dr. Wendy Burns, Dr. Tom Kana, Dr. Kim Love, Dr. Barbara Martin, Dr. Jillian Skelton, Dr. Gary Torkington, Dr. Marie Underwood, and Dr. Christopher Wells. You each provided me with guidance, inspiration, and encouragement that made this process much more manageable and this goal more obtainable. Thank you to Mr. Bryan Yancey and Mr. Timothy England for your patience and support without which this effort would have been longer and harder. I give a heartfelt thank you to my immediate and extended family members who have cheered my progress and encouraged my growth. I would like to extend my appreciation to my committee members, Dr. Timothy Perez, Dr. Gail Miles, and Dr. Steven Case, for their guidance and direction. Thank you as well to all the other researchers that have gone before me and provided a base of knowledge on which I could build. Especially to those who so graciously, kindly, and unselfishly granted me rights to use their work as building blocks for my own without even knowing me. My gratitude goes to my study organization and those in it who so readily accepted and supported my work and me. The dedication of all recognized here to the pursuit of knowledge and learning is evident and appreciated. There are many others, far too many to list, who in some big or small way provided me with endless sources of support, motivation, and encouragement. Know that it does not go forgotten. I recognize and appreciate you all. Table of Contents List of Tables .......................................................................................................................v List of Figures ................................................................................................................... vii Section 1: Foundation of the Study ......................................................................................1 Background of the Problem ...........................................................................................1 Problem Statement .........................................................................................................3 Purpose Statement ..........................................................................................................3 Nature of the Study ........................................................................................................4 Quantitative Research Question .....................................................................................6 Hypotheses .....................................................................................................................6 Theoretical Framework ..................................................................................................7 Definition of Terms........................................................................................................8 Assumptions, Limitations, and Delimitations ................................................................9 Assumptions ............................................................................................................ 9 Limitations ............................................................................................................ 11 Delimitations ......................................................................................................... 13 Significance of the Study .............................................................................................14 Contribution to Information Technology Practice ................................................ 14 Implications for Social Change ............................................................................. 15 A Review of the Professional and Academic Literature ..............................................15 Computer End Users as a Security Threat ............................................................ 18 Nontechnical Security Controls ............................................................................ 22 i Social and Behavioral Theories in Information Security Research ...................... 28 Methodologies Used in Extant Literature ............................................................. 67 Measurement Instruments Used in Extant Literature ........................................... 68 Contention in the Literature .................................................................................. 69 Relationship of Proposed Study to Extant Research............................................. 70 Aspects for Further Research Cited in Extant Literature ...................................... 72 Transition and Summary ..............................................................................................73 Section 2: The Project ........................................................................................................77 Purpose Statement ........................................................................................................77 Role of the Researcher .................................................................................................78 Participants ...................................................................................................................80 Research Method and Design ......................................................................................81 Method .................................................................................................................. 82 Research Design.................................................................................................... 86 Population and Sampling .............................................................................................89 Ethical Research...........................................................................................................94 Instrumentation ............................................................................................................96 Measurements ....................................................................................................... 96 Measurement Instrument ...................................................................................... 97 Data Collection Technique ........................................................................................103 Data Analysis .............................................................................................................105 Quantitative Research Question .......................................................................... 105 ii Hypotheses .......................................................................................................... 106 Data Analysis Approach ..................................................................................... 106 Data Screening .................................................................................................... 108 Data Analysis Technique .................................................................................... 112 Study Validity ............................................................................................................114 Transition and Summary ............................................................................................117 Section 3: Application to Professional Practice and Implications for Change ................119 Overview of Study .....................................................................................................119 Presentation of the Findings.......................................................................................120 Data Screening .................................................................................................... 121 Response Demographics ..................................................................................... 124 Factor Calculation and Descriptive Statistics ..................................................... 126 Data Assumptions ............................................................................................... 128 Multiple Linear Regression Data Analysis ......................................................... 143 Logistic Regression Data Analysis ..................................................................... 157 Summary of Statistical Analyses ........................................................................ 161 Discussion of Findings ........................................................................................ 162 Applications to Professional Practice ........................................................................169 Implications for Social Change ..................................................................................174 Recommendations for Action ....................................................................................175 Recommendations for Further Study .........................................................................177 Reflections .................................................................................................................180 iii
Description: